inline:
Paul Kyzivat wrote:
Eric Rescorla wrote:
At Tue, 24 Jun 2008 12:48:20 -0700,
Eric Rescorla wrote:
Dean,
This sounds like an excellent way to proceed. I'll generate some
candidate text
and send it to the list in the next few days.
As promised, here's my proposed text:
Because DTLS-SRTP uses RFC 4474 to bind the media keying material to
the SIP signalling, the assurances about the provenance and security
of the media are only as good as those for the signalling. There are
two important cases to note here:
o RFC 4474 assumes that the proxy with the certificate "example.com"
controls the namespace "example.com". Therefore the RFC 4474
authentication service which is authoritative for a given
namespace can control which user is assigned each name. Thus, the
authentication service can take an address formerly assigned to
Alice and transfer it to Bob. This is an intentional design
feature of RFC 4474 and a direct consequence of the SIP namespace
architecture.
o When phone number URIs (e.g.,
'sip:[EMAIL PROTECTED]') are used, there is no
structural reason to trust that the domain name is authoritative
for a given phone number, although individual proxies and UAs may
have private arrangements that allow them to trust other domains.
This is a structural issue in that PSTN elements are trusted to
assert their phone number correctly and that there is no real
concept of a given entity being authoritative for some number
space.
In both of these cases, the assurances of DTLS-SRTP provides in
terms of data origin integrity and confidentiality are necessarily
no better than SIP provides for signalling integrity when RFC 4474
is used. Implementors should therefore take care not to indicate
misleading peer identity information in the user interface.
e.g. If the peer's identity is
sip:[EMAIL PROTECTED], it is not sufficient to
display that the identity of the peer is +17005551008. In cases
where the UA can determine that the peer identity is clearly an
E.164 number, it may be less confusing to simply identify the call
as encrypted but to an unknown peer.
While I understand the logic above, it isn't very satisfying.
People are constructing sip based phone systems that must compete with
traditional phone systems. If the sip based system shows no identity
when a traditional system can display the identity of the same caller,
then the sip system will be perceived and broken and non-competitive.
Its not just a UI problem - the problem is that the identity really IS
just +17005551008 - without the domain. I don't need the domain to dial
it from a phone. So even if the UI could render a domain, I don't think
it makes sense to do so.
That said, another possible approach here is to more loosely couple
DTLS-SRTP to 4474. It is my understanding that what DTLS-SRTP needs is
integrity of the signaling to protect the fingerprint from modification.
Any mechanism which provides message integrity would do. RFC4474 is one
way, but there are others. HBH TLS, for example, would also provide
integrity services, though not against rogue servers. Of course, we
don't have protection against rogue servers with 4474 either in cases
where phone numbers are used...
So my suggestion is to have DTLS-SRTP just state that it requires some
form of integrity services from signaling, to list some choices in what
that can be. I think its also really important to point out that, even
in the absence of any message integrity mechanisms at all, it requires
an ACTIVE attack in order for a third party to eavesdrop or modify
media. Whereas with sdescriptions, passive attacks can be launched if an
attacker can observe the keying material at some point along the
signaling path. That alone is a big improvement IMHO.
-Jonathan R.
--
Jonathan D. Rosenberg, Ph.D. 499 Thornall St.
Cisco Fellow Edison, NJ 08837
Cisco, Voice Technology Group
[EMAIL PROTECTED]
http://www.jdrosen.net PHONE: (408) 902-3084
http://www.cisco.com
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip